SlideShare a Scribd company logo
1 of 35
NETWORK TOPOLOGIES
Dr. Kamal Gulati
Topology
The shape of a Local-Area
Network (LAN) or other
communications system.
Topologies are either Physical
or Logical.
Physical Topology
The physical layout of devices on a network. Every LAN
has a topology, or the way that the devices on a
network are arranged and how they communicate with
each other. The way that the workstations are
connected to the network through the actual cables that
transmit data -- the physical structure of the network --
is called the physical topology.
How the physical components on a network are connected.
(Design, Diagram & Map(
Logical Topology
The logical topology, also called signal topology in
contrast, is the way that the signals act on the
network media, or the way that the data passes
through the network from one device to the next
without regard to the physical interconnection of
the devices.
Logical topologies are bound to the network
protocols that direct how the data moves across a
network. The Ethernet protocol is a common
logical bus topology protocol.
Token Ring networks use a logical ring topology,
but physically they are cabled using a star
topology.
Six Basic Physical Topologies
 Bus
 Star
 Ring
 Tree
 Mesh
 Hybrid
Bus Topology
 All computers are attached to a continuous cable, or
segment
 A packet is transmitted to all network adapters on that
segment
 The ends of the cable must be terminated by terminators
BUS
 When a device wants to transmit across the
bus, it has to determine whether the media is
in use.
 If no other device is transmitting, the signal is
sent.
 Each device receives the signal and then
determines whether its address matches that of
the recipient.
BUS TOPOLOGY
For e.g. System 'B' wants to transfer data to System 'G'.
First: System ‘B’ will broadcast the data to every system.
Second: System ‘G’ will make a copy of data which has been send
by system ‘B’ after that the data will be terminated.
A B C D E F G
TerminatorTerminator
There are three issues to consider with linear bus topology
 The number of computers connected to the cable: The
more computers on the network, the more traffic there will be
on the network. These computers will compete with each other
to send data because they can only do so one at a time.
 Signal bounce: signal bounce refers to an electrical property
of sending data through a cable. Without termination, an
electrical signal will bounce back and forth along the cable,
preventing all computers from sending data.
 Terminators: Each end of the trunk cable needs to be
properly terminated. A terminator prevents signal bounce.
 Bus topologies use coaxial cable. T connectors are often used
to connect the computer to the trunk cable.
BUS Topology Features
 Problem: If there is
1. A break anywhere in the cable OR
2. An end is not terminated
 Consequence: the signal will travel back and
forth across the network and ALL
COMMUNICATION WILL STOP.
BUS Topology Features
 The number of computers attached to a bus also
affects network performance.
 Because of the way computers communicate in a
bus topology, there may be a lot of collision or
noise.
BUS
 The advantages of using bus include
 Easy to install and configure
 Inexpensive
 Easily extended.
The disadvantages of using bus include
 Performance degrades.
 Barrel connectors used to extend the cable lengths can
weaken the signal.
 Troubleshooting a bus can be quite
Star Topology
 Cable segments from each computer on the network are
connected to a central component, or HUB.
 A hub is a device that connects several computers together.
 Most common network configuration in use today.
 Star Topology, is the best for implementing any king of network.
Star Topology Features
ADVANTAGES:
 If one computer on the star topology fails, the remainder
of the network functions normally.
___________________________________________
DISADVANTAGES:
 Because each computer is connected to a hub, if the hub
fails, the entire network fails.
Types of Hub
 A passive hub: is used to connect computers in a
broadcast network. The signal sent to a passive hub is sent
to all workstations with no regeneration or amplification.
 An active hub: uses an external power source and
regenerates the signal before sending it out to all
workstations. Because the active hub regenerates the
signal, greater cable distances are allowed.
 A switched hub :directs the signal directly to the
recipient. Switched hubs can greatly reduce network traffic.
Ring Topology
 Computers are connected on a single circle of cable
 There are no terminated ends
 The signals travel around the loop in one direction and pass
through each computer, which acts as a repeater
Ring topology Feature
ADVANTAGE
 Each computer acts as a repeater, thereby preserving
signal strength.
 Handle high-traffic environments better than bus
networks.
 The impact of noise is reduced in the ring topology.
DISADVANTAGE
 only one computer at a time can send data on a single
token ring.
 Usually more expensive than bus technologies.
Token Passing
 The method of transmitting data around the ring
is called token passing.
 A token is a special series of bits that contains
control information.
 Possession of the token allows a network device to
transmit data to the network.
 Each network has ONLY ONE TOKEN.
Concept of Ring Topology
All computers are connected by a single
cable.
In Ring Topology the ends are not terminated
and the cable forms a full loop connecting
the last computer to the first computer.
Token Passing Ring Concept.
The Way of Transmitting Using Token Passing
 The sending computer removes the token from the ring
 It sends the message around the ring.
 Each computer passes along the message until the it finds
the computer that matches the address.
 The receiving computer then returns a confirmation
message to the sending computer.
 After verification, the sending computer creates a new
token and releases it to the network.
Mesh Topology
 Each computer is connected to every other computer by a
separate cable
Mesh Topology
ADVANTAGES
 If one cable fails, another carries the traffic and the
network continues to function.
 On a larger scale, multiple LANs can be connected to each
other by using leased telephone lines.
DISADVANTAGES
 Because redundant paths, a mesh topology can be
expensive
 The number of interconnections would be more.
 Difficult to implement with Big Network.
 Very Complicated.
 Multiple use of NIC Card in every system.
Hybrid Topologies
 Two or more topologies are combined to form a
complete network design.
 Star-bus topology.
 Star-ring topology.
Star-Bus
BUS
Star-Ring
Tree Topology
Also known as a star bus topology,
tree topology is one of the most
common types of network setups
that is similar to a bus topology and
a star topology. A tree topology
connects multiple star networks to
other star networks. Below is a
visual example of a simple
computer setup on a network using
the star topology.
A network topology that, from a purely topologic
viewpoint, resembles an interconnection of star
networks in that individual peripheral nodes are
required to transmit to and receive from one other
node only, toward a central node, and are not
required to act as repeaters or regenerators.
Note 1: The function of the central node may be
distributed
Note 2: As in the conventional star network, individual
nodes may thus still be isolated from the network by a
single-point failure of a transmission path to the node.
Note 3: A single-point failure of a transmission path
within a distributed node will result in partitioning two
or more stations from the rest of the network.
Physical Topology Common Protocol Common Cable
Linear Bus
Ethernet Twisted Pair
LocalTalk Coaxial
Fiber
Star
Ethernet Twisted Pair
LocalTalk Fiber
Star-Wired Ring Token Ring Twisted Pair
Tree Ethernet
Twisted Pair
Coaxial
Fiber
Dr. Kamal Gulati
Associate Professor |
University Quality Support Head |
Mentoring Programme Coordinator
]Ph. D., M.Sc. (Computer Science), M.C.A., M.B.A[
Professional Certifications:
Certified Microsoft Innovative Educator
Data Science 101 Certification from Big Data University
R Language 101 Certification from Big Data University
SQL Certification from SOLOLEARN.com
Certified IBM Big Data 101 from Big Data University
R Program & Python Certified from DataCamp
Wiley Certified Big Data Analyst [WCBDA[
Certification on DBMS from IIT Mumbai
Certified Cisco Certified Network Associate [CCNA[
Certified Microsoft Certified Professional [MCP[
Certified Brainbench in Computer Fundamentals, Microsoft Access, MySQL
5.7 Administration & Microsoft Project
•Worked as Visiting Professor with Stratford University, USA for six months
from Jan’2016 to June’2016.
•Also worked at Bahrain University in Kingdom of Bahrain Sr. I.T. Faculty
(Computer Science Department) for Period of 2 Years.
•Have rich experience in the field of teaching and research in Computer
Science and Information Technology for almost 15+ years in Academia.
•Having experience of working with both private and public institutions and
universities as the lecturer and self-instruction material writer for
Information Technology courses.
•Had number of research papers published in national and international
journals and conference proceedings in IEEE and Scopus Index.
•Also chaired various National and International Conferences of repute and
associated with various International Journals as Editorial Board Member
for International and National, Academic Adviser and Research Paper
Reviewer.
My current area of interest: Big Data Analytics, R Software, Management
Information System, IT Project Management, Decision Support System,
Business Analytics, Database Management System, Data Networking and
Advanced Excel with Visual Basic Macros.
Country Visited: USA, Canada, UK, UAE, Bahrain, Oman (Mostly for
Teaching and Research Purpose(
Profile of Dr. Kamal Gulati
Technical Program Committee for International Conference on Data, Engineering and
Applications 2017 (IDEA-2k17) which would be on October 28-29, 2017 at Bhopal.
http://www.ideaconference.in
Advisory Board Committee Member for International Conference on Energy,
Communication, Data Analytics and Soft Computing (ICECDS) which would be on 1-2
August 2017 at SKR Engineering College, Poonamallee, Tamil Nadu, India.http://ecds.org.in
Advisory Committee Member for International Conference on Innovative Research in
Engineering and Science which would be on 16-17 June 2017 at Asian Institute of
Technology Conference Center Thailand.http://www.iresconf.org
Advisory Committee Member for International Conference on Cloud Computing and Internet
of everything which held on 10-11 Feb’2016 at Delhi-NCR.http://www.ccioet.org
Technical Committee member for InCITe-2016 (International Conference on Information
Technology) Theme - Internet of Things: Connect Your Worlds, IT Summit, Amity
University 2016 which held on 06-07 Oct, 2016.http://www.amity.edu/incite2016
Technical Speaker for Global perspective on IT business “The Changing Scenario” – Big
Data on International Students Conference New Delhi (ISCND) which held on 14-15 Oct,
2016http://iscnd.com
Advisory Committee Member for International Conference on Sustainable Computing
Techniques in Engineering, Science and Management which has held on 09-10 Sep’2016 at
Delhi-NCR.http://www.scesm.org
Technical Program Committee Member for Program Committee Member for International
Conference on Recent Trends IN ICT, Jaipur, India, Aug 18-19, 2017 http://rtict.org
Program Committee Member for International Conference on Recent Advancement in
Computer and Communication Bhopal, India, (IC-RAC-2017) May 26-27, 2017
http://www.icrac.co.in
Profile Contd….
Editorial Board member for the following International
Journals:
International Journal of Computer Science and Innovation
http://www.infinitysciences.org
International Journal of Latest Research in Engineering and
Technology http://www.ijlret.com
International Journal of Latest Trends in Engineering and
Technology http://www.ijltet.org
InternationalJournalofApplicationorInnovationin
Engineering&Management http://www.ijaiem.org
International Journal for Management http://www.ijm-apm.com
ITM International Journal of Innovations in Science, Engineering
& Management www.iijisem.org
The International Journal of Emerging Engineering and
Embedded Systems http://www.ijeees.org
Conference Info http://conferenceinfo.org/tpc.php
International Journal of Computer Engineering in Research
Trends (IJCERT) http://www.ijcert.org
Expert Speaker for Program “Insurance Beyond Doubt”
Presented by Oriental Insurance Co Ltd.
https://www.youtube.com/watch?v=GrvJkN_Zn3Q
Profile Contd….
BOOK, CHAPTER, and CASE STUDY Published
Published Book on “A Study of Changing Trends in E-CRM
of Indian Insurance Industry” Published by LAP Lambert
Academic Publishing, one of the top researchers and
renowned scientists of Germany with ISBN: 3330009543,
9783330009547. The Book available at Amazon.com.
Published Real Case Study on “IoT Security
Considerations for Higher Education” published on
Business Cases - RENVOI 2017 BOOK (The Case Centre,
UK) with ISBN: 978-1-4828-8840-9, Page 63-70. The
Book available at the various online website: Amazon,
AbeBooks, Chegg, Barnes & Noble.
Published Chapter on "Role of eWorld in Insurance
Innovation" Published by Insurance Institute of India
(III), 60 Years Diamond Jubilee, Compendium, Nov 2016
– (Magazine) – One of the premium Insurance Institute
of India.
Contact Details
Email : drkamalgulati@gmail.com
Website : http://mybigdataanalytics.com
LinkedIn :
https://in.linkedin.com/in/drkamalgulati

More Related Content

What's hot

Wireless network ppt
Wireless network pptWireless network ppt
Wireless network pptBasil John
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architectureOrbay Yeşil
 
Chapter 1 introduction to computer networks
Chapter 1 introduction to computer networksChapter 1 introduction to computer networks
Chapter 1 introduction to computer networksViku1985
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksShafaan Khaliq Bhatti
 
Computer Networking 101
Computer Networking 101Computer Networking 101
Computer Networking 101Sameer Mahajan
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer NetworksGhaffar Khan
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)Ankur Kumar
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networksHaider Ali Malik
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals Kirti Verma
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Alan Mark
 
Network cable
Network cableNetwork cable
Network cableOnline
 

What's hot (20)

Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Chapter 1 introduction to computer networks
Chapter 1 introduction to computer networksChapter 1 introduction to computer networks
Chapter 1 introduction to computer networks
 
Unit II -Mobile telecommunication systems
Unit II -Mobile telecommunication systemsUnit II -Mobile telecommunication systems
Unit II -Mobile telecommunication systems
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Computer Networking 101
Computer Networking 101Computer Networking 101
Computer Networking 101
 
Wireless network
Wireless networkWireless network
Wireless network
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Networking
NetworkingNetworking
Networking
 
Application Layer
Application Layer Application Layer
Application Layer
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Network cable
Network cableNetwork cable
Network cable
 

Similar to Network Topologies in Simple (Logical, Physical and Types)

Networking hard copy (1)
Networking  hard copy (1)Networking  hard copy (1)
Networking hard copy (1)Ankita Shetty
 
Network topology
Network topologyNetwork topology
Network topologylekshmik
 
basic networking
basic networkingbasic networking
basic networkingAnmol Bagga
 
Network using topologies
Network using topologiesNetwork using topologies
Network using topologiesJaveria600
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterAlidHasan4
 
Determine best fit topology copy
Determine best fit topology   copyDetermine best fit topology   copy
Determine best fit topology copyJaleto Sunkemo
 
Networktopology xii
Networktopology xiiNetworktopology xii
Networktopology xiisaltyp
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxSuratSingh18
 
Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client serverSatya P. Joshi
 
Network Topologies in computer networking
Network Topologies in computer networkingNetwork Topologies in computer networking
Network Topologies in computer networkingnazmulabdal
 
Determine best fit topology
Determine best fit topologyDetermine best fit topology
Determine best fit topologyAbenezer Abiti
 
Topography
TopographyTopography
Topographyrosu555
 

Similar to Network Topologies in Simple (Logical, Physical and Types) (20)

Networking hard copy (1)
Networking  hard copy (1)Networking  hard copy (1)
Networking hard copy (1)
 
Network topology
Network topologyNetwork topology
Network topology
 
basic networking
basic networkingbasic networking
basic networking
 
Arvind Singh
Arvind SinghArvind Singh
Arvind Singh
 
Topology
TopologyTopology
Topology
 
Network topology
Network topologyNetwork topology
Network topology
 
Network Topology
Network Topology Network Topology
Network Topology
 
Lesson 8
Lesson 8Lesson 8
Lesson 8
 
Network using topologies
Network using topologiesNetwork using topologies
Network using topologies
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouter
 
Determine best fit topology copy
Determine best fit topology   copyDetermine best fit topology   copy
Determine best fit topology copy
 
Networktopology xii
Networktopology xiiNetworktopology xii
Networktopology xii
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
 
original
originaloriginal
original
 
Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client server
 
Network Topologies in computer networking
Network Topologies in computer networkingNetwork Topologies in computer networking
Network Topologies in computer networking
 
Determine best fit topology
Determine best fit topologyDetermine best fit topology
Determine best fit topology
 
network topology
network topologynetwork topology
network topology
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Topography
TopographyTopography
Topography
 

More from Amity University | FMS - DU | IMT | Stratford University | KKMI International Institute | AIMA | DTU

More from Amity University | FMS - DU | IMT | Stratford University | KKMI International Institute | AIMA | DTU (20)

All About DBMS - Interview Question and Answers
All About DBMS - Interview Question and AnswersAll About DBMS - Interview Question and Answers
All About DBMS - Interview Question and Answers
 
Concept of Governance - Management of Operational Risk for IT Officers/Execut...
Concept of Governance - Management of Operational Risk for IT Officers/Execut...Concept of Governance - Management of Operational Risk for IT Officers/Execut...
Concept of Governance - Management of Operational Risk for IT Officers/Execut...
 
Emerging Technologies in IT
Emerging Technologies in ITEmerging Technologies in IT
Emerging Technologies in IT
 
Introduction to DBMS - Notes in Layman...
Introduction to DBMS - Notes in Layman...Introduction to DBMS - Notes in Layman...
Introduction to DBMS - Notes in Layman...
 
Fundamentals of DBMS
Fundamentals of DBMSFundamentals of DBMS
Fundamentals of DBMS
 
CASE (Computer Aided Software Design)
CASE (Computer Aided Software Design)CASE (Computer Aided Software Design)
CASE (Computer Aided Software Design)
 
SOFTWARE RELIABILITY AND QUALITY ASSURANCE
SOFTWARE RELIABILITY AND QUALITY ASSURANCESOFTWARE RELIABILITY AND QUALITY ASSURANCE
SOFTWARE RELIABILITY AND QUALITY ASSURANCE
 
Software Testing (Contd..) SDLC Model
Software Testing (Contd..) SDLC ModelSoftware Testing (Contd..) SDLC Model
Software Testing (Contd..) SDLC Model
 
Software Testing - SDLC Model
Software Testing - SDLC ModelSoftware Testing - SDLC Model
Software Testing - SDLC Model
 
Coding - SDLC Model
Coding - SDLC ModelCoding - SDLC Model
Coding - SDLC Model
 
Software Design - SDLC Model
Software Design - SDLC ModelSoftware Design - SDLC Model
Software Design - SDLC Model
 
Models of SDLC (Contd..) & Feasibility Study
Models of SDLC (Contd..)  & Feasibility StudyModels of SDLC (Contd..)  & Feasibility Study
Models of SDLC (Contd..) & Feasibility Study
 
Models of SDLC (Software Development Life Cycle / Program Development Life Cy...
Models of SDLC (Software Development Life Cycle / Program Development Life Cy...Models of SDLC (Software Development Life Cycle / Program Development Life Cy...
Models of SDLC (Software Development Life Cycle / Program Development Life Cy...
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKETCLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
 
Application Software
Application SoftwareApplication Software
Application Software
 
Application Software – Horizontal & Vertical Software
Application Software – Horizontal & Vertical SoftwareApplication Software – Horizontal & Vertical Software
Application Software – Horizontal & Vertical Software
 
Software: Systems and Application Software
Software:  Systems and Application SoftwareSoftware:  Systems and Application Software
Software: Systems and Application Software
 
Programming Languages
Programming LanguagesProgramming Languages
Programming Languages
 
Number Codes and Registers
Number Codes and RegistersNumber Codes and Registers
Number Codes and Registers
 

Recently uploaded

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 

Recently uploaded (20)

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 

Network Topologies in Simple (Logical, Physical and Types)

  • 2. Topology The shape of a Local-Area Network (LAN) or other communications system. Topologies are either Physical or Logical.
  • 3. Physical Topology The physical layout of devices on a network. Every LAN has a topology, or the way that the devices on a network are arranged and how they communicate with each other. The way that the workstations are connected to the network through the actual cables that transmit data -- the physical structure of the network -- is called the physical topology. How the physical components on a network are connected. (Design, Diagram & Map(
  • 4. Logical Topology The logical topology, also called signal topology in contrast, is the way that the signals act on the network media, or the way that the data passes through the network from one device to the next without regard to the physical interconnection of the devices. Logical topologies are bound to the network protocols that direct how the data moves across a network. The Ethernet protocol is a common logical bus topology protocol. Token Ring networks use a logical ring topology, but physically they are cabled using a star topology.
  • 5. Six Basic Physical Topologies  Bus  Star  Ring  Tree  Mesh  Hybrid
  • 6. Bus Topology  All computers are attached to a continuous cable, or segment  A packet is transmitted to all network adapters on that segment  The ends of the cable must be terminated by terminators
  • 7. BUS  When a device wants to transmit across the bus, it has to determine whether the media is in use.  If no other device is transmitting, the signal is sent.  Each device receives the signal and then determines whether its address matches that of the recipient.
  • 8. BUS TOPOLOGY For e.g. System 'B' wants to transfer data to System 'G'. First: System ‘B’ will broadcast the data to every system. Second: System ‘G’ will make a copy of data which has been send by system ‘B’ after that the data will be terminated. A B C D E F G TerminatorTerminator
  • 9. There are three issues to consider with linear bus topology  The number of computers connected to the cable: The more computers on the network, the more traffic there will be on the network. These computers will compete with each other to send data because they can only do so one at a time.  Signal bounce: signal bounce refers to an electrical property of sending data through a cable. Without termination, an electrical signal will bounce back and forth along the cable, preventing all computers from sending data.  Terminators: Each end of the trunk cable needs to be properly terminated. A terminator prevents signal bounce.  Bus topologies use coaxial cable. T connectors are often used to connect the computer to the trunk cable.
  • 10. BUS Topology Features  Problem: If there is 1. A break anywhere in the cable OR 2. An end is not terminated  Consequence: the signal will travel back and forth across the network and ALL COMMUNICATION WILL STOP.
  • 11. BUS Topology Features  The number of computers attached to a bus also affects network performance.  Because of the way computers communicate in a bus topology, there may be a lot of collision or noise.
  • 12. BUS  The advantages of using bus include  Easy to install and configure  Inexpensive  Easily extended. The disadvantages of using bus include  Performance degrades.  Barrel connectors used to extend the cable lengths can weaken the signal.  Troubleshooting a bus can be quite
  • 13. Star Topology  Cable segments from each computer on the network are connected to a central component, or HUB.  A hub is a device that connects several computers together.  Most common network configuration in use today.  Star Topology, is the best for implementing any king of network.
  • 14. Star Topology Features ADVANTAGES:  If one computer on the star topology fails, the remainder of the network functions normally. ___________________________________________ DISADVANTAGES:  Because each computer is connected to a hub, if the hub fails, the entire network fails.
  • 15. Types of Hub  A passive hub: is used to connect computers in a broadcast network. The signal sent to a passive hub is sent to all workstations with no regeneration or amplification.  An active hub: uses an external power source and regenerates the signal before sending it out to all workstations. Because the active hub regenerates the signal, greater cable distances are allowed.  A switched hub :directs the signal directly to the recipient. Switched hubs can greatly reduce network traffic.
  • 16. Ring Topology  Computers are connected on a single circle of cable  There are no terminated ends  The signals travel around the loop in one direction and pass through each computer, which acts as a repeater
  • 17. Ring topology Feature ADVANTAGE  Each computer acts as a repeater, thereby preserving signal strength.  Handle high-traffic environments better than bus networks.  The impact of noise is reduced in the ring topology. DISADVANTAGE  only one computer at a time can send data on a single token ring.  Usually more expensive than bus technologies.
  • 18. Token Passing  The method of transmitting data around the ring is called token passing.  A token is a special series of bits that contains control information.  Possession of the token allows a network device to transmit data to the network.  Each network has ONLY ONE TOKEN.
  • 19. Concept of Ring Topology All computers are connected by a single cable. In Ring Topology the ends are not terminated and the cable forms a full loop connecting the last computer to the first computer. Token Passing Ring Concept.
  • 20. The Way of Transmitting Using Token Passing  The sending computer removes the token from the ring  It sends the message around the ring.  Each computer passes along the message until the it finds the computer that matches the address.  The receiving computer then returns a confirmation message to the sending computer.  After verification, the sending computer creates a new token and releases it to the network.
  • 21. Mesh Topology  Each computer is connected to every other computer by a separate cable
  • 22. Mesh Topology ADVANTAGES  If one cable fails, another carries the traffic and the network continues to function.  On a larger scale, multiple LANs can be connected to each other by using leased telephone lines. DISADVANTAGES  Because redundant paths, a mesh topology can be expensive  The number of interconnections would be more.  Difficult to implement with Big Network.  Very Complicated.  Multiple use of NIC Card in every system.
  • 23. Hybrid Topologies  Two or more topologies are combined to form a complete network design.  Star-bus topology.  Star-ring topology.
  • 26. Tree Topology Also known as a star bus topology, tree topology is one of the most common types of network setups that is similar to a bus topology and a star topology. A tree topology connects multiple star networks to other star networks. Below is a visual example of a simple computer setup on a network using the star topology.
  • 27.
  • 28. A network topology that, from a purely topologic viewpoint, resembles an interconnection of star networks in that individual peripheral nodes are required to transmit to and receive from one other node only, toward a central node, and are not required to act as repeaters or regenerators. Note 1: The function of the central node may be distributed Note 2: As in the conventional star network, individual nodes may thus still be isolated from the network by a single-point failure of a transmission path to the node. Note 3: A single-point failure of a transmission path within a distributed node will result in partitioning two or more stations from the rest of the network.
  • 29. Physical Topology Common Protocol Common Cable Linear Bus Ethernet Twisted Pair LocalTalk Coaxial Fiber Star Ethernet Twisted Pair LocalTalk Fiber Star-Wired Ring Token Ring Twisted Pair Tree Ethernet Twisted Pair Coaxial Fiber
  • 30. Dr. Kamal Gulati Associate Professor | University Quality Support Head | Mentoring Programme Coordinator ]Ph. D., M.Sc. (Computer Science), M.C.A., M.B.A[ Professional Certifications: Certified Microsoft Innovative Educator Data Science 101 Certification from Big Data University R Language 101 Certification from Big Data University SQL Certification from SOLOLEARN.com Certified IBM Big Data 101 from Big Data University R Program & Python Certified from DataCamp Wiley Certified Big Data Analyst [WCBDA[ Certification on DBMS from IIT Mumbai Certified Cisco Certified Network Associate [CCNA[ Certified Microsoft Certified Professional [MCP[ Certified Brainbench in Computer Fundamentals, Microsoft Access, MySQL 5.7 Administration & Microsoft Project
  • 31. •Worked as Visiting Professor with Stratford University, USA for six months from Jan’2016 to June’2016. •Also worked at Bahrain University in Kingdom of Bahrain Sr. I.T. Faculty (Computer Science Department) for Period of 2 Years. •Have rich experience in the field of teaching and research in Computer Science and Information Technology for almost 15+ years in Academia. •Having experience of working with both private and public institutions and universities as the lecturer and self-instruction material writer for Information Technology courses. •Had number of research papers published in national and international journals and conference proceedings in IEEE and Scopus Index. •Also chaired various National and International Conferences of repute and associated with various International Journals as Editorial Board Member for International and National, Academic Adviser and Research Paper Reviewer. My current area of interest: Big Data Analytics, R Software, Management Information System, IT Project Management, Decision Support System, Business Analytics, Database Management System, Data Networking and Advanced Excel with Visual Basic Macros. Country Visited: USA, Canada, UK, UAE, Bahrain, Oman (Mostly for Teaching and Research Purpose( Profile of Dr. Kamal Gulati
  • 32. Technical Program Committee for International Conference on Data, Engineering and Applications 2017 (IDEA-2k17) which would be on October 28-29, 2017 at Bhopal. http://www.ideaconference.in Advisory Board Committee Member for International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS) which would be on 1-2 August 2017 at SKR Engineering College, Poonamallee, Tamil Nadu, India.http://ecds.org.in Advisory Committee Member for International Conference on Innovative Research in Engineering and Science which would be on 16-17 June 2017 at Asian Institute of Technology Conference Center Thailand.http://www.iresconf.org Advisory Committee Member for International Conference on Cloud Computing and Internet of everything which held on 10-11 Feb’2016 at Delhi-NCR.http://www.ccioet.org Technical Committee member for InCITe-2016 (International Conference on Information Technology) Theme - Internet of Things: Connect Your Worlds, IT Summit, Amity University 2016 which held on 06-07 Oct, 2016.http://www.amity.edu/incite2016 Technical Speaker for Global perspective on IT business “The Changing Scenario” – Big Data on International Students Conference New Delhi (ISCND) which held on 14-15 Oct, 2016http://iscnd.com Advisory Committee Member for International Conference on Sustainable Computing Techniques in Engineering, Science and Management which has held on 09-10 Sep’2016 at Delhi-NCR.http://www.scesm.org Technical Program Committee Member for Program Committee Member for International Conference on Recent Trends IN ICT, Jaipur, India, Aug 18-19, 2017 http://rtict.org Program Committee Member for International Conference on Recent Advancement in Computer and Communication Bhopal, India, (IC-RAC-2017) May 26-27, 2017 http://www.icrac.co.in Profile Contd….
  • 33. Editorial Board member for the following International Journals: International Journal of Computer Science and Innovation http://www.infinitysciences.org International Journal of Latest Research in Engineering and Technology http://www.ijlret.com International Journal of Latest Trends in Engineering and Technology http://www.ijltet.org InternationalJournalofApplicationorInnovationin Engineering&Management http://www.ijaiem.org International Journal for Management http://www.ijm-apm.com ITM International Journal of Innovations in Science, Engineering & Management www.iijisem.org The International Journal of Emerging Engineering and Embedded Systems http://www.ijeees.org Conference Info http://conferenceinfo.org/tpc.php International Journal of Computer Engineering in Research Trends (IJCERT) http://www.ijcert.org Expert Speaker for Program “Insurance Beyond Doubt” Presented by Oriental Insurance Co Ltd. https://www.youtube.com/watch?v=GrvJkN_Zn3Q Profile Contd….
  • 34. BOOK, CHAPTER, and CASE STUDY Published Published Book on “A Study of Changing Trends in E-CRM of Indian Insurance Industry” Published by LAP Lambert Academic Publishing, one of the top researchers and renowned scientists of Germany with ISBN: 3330009543, 9783330009547. The Book available at Amazon.com. Published Real Case Study on “IoT Security Considerations for Higher Education” published on Business Cases - RENVOI 2017 BOOK (The Case Centre, UK) with ISBN: 978-1-4828-8840-9, Page 63-70. The Book available at the various online website: Amazon, AbeBooks, Chegg, Barnes & Noble. Published Chapter on "Role of eWorld in Insurance Innovation" Published by Insurance Institute of India (III), 60 Years Diamond Jubilee, Compendium, Nov 2016 – (Magazine) – One of the premium Insurance Institute of India.
  • 35. Contact Details Email : drkamalgulati@gmail.com Website : http://mybigdataanalytics.com LinkedIn : https://in.linkedin.com/in/drkamalgulati